diff --git a/docs/images/kernel-2.6.16-1.png b/docs/images/kernel-2.6.16-1.png
new file mode 100644
index 000000000..9195207ad
Binary files /dev/null and b/docs/images/kernel-2.6.16-1.png differ
diff --git a/docs/images/kernel-2.6.16-2.png b/docs/images/kernel-2.6.16-2.png
new file mode 100644
index 000000000..2c20aee80
Binary files /dev/null and b/docs/images/kernel-2.6.16-2.png differ
diff --git a/docs/kernel.xml b/docs/kernel.xml
index 5ac789ee5..e51a38017 100644
--- a/docs/kernel.xml
+++ b/docs/kernel.xml
@@ -243,4 +243,23 @@ CONFIG_BRIDGE_NF_EBTABLES=m
+
+
+ Kernel 2.6.16 and Later Netfilter Options
+
+ Here's a screenshot of my modularized 2.6.16 Kernel config
+ (Navigation: Networking → Networking Options → Network Packet Filtering
+ (replaces ipchains) → Core Netfilter configuration):
+
+
+
+ Note that is is particularly important to select "Netfilter Xtables
+ support (required for ip_tables).
+
+ Here's a screenshot of the IP Netfilter config (Navigation:
+ Networking → Networking Options → Network Packet Filtering (replaces
+ ipchains) → IP: Netfilter configuration):
+
+
+
\ No newline at end of file
diff --git a/docs/starting_and_stopping_shorewall.xml b/docs/starting_and_stopping_shorewall.xml
index 6937fe954..644ceecbc 100644
--- a/docs/starting_and_stopping_shorewall.xml
+++ b/docs/starting_and_stopping_shorewall.xml
@@ -672,7 +672,7 @@
clear
- shorewall clear
+ shorewall[-lite] clear
Clear will remove all rules and chains installed by Shorewall.
The firewall is then wide open and unprotected. Existing connections
@@ -792,7 +792,7 @@
dump
- shorewall[-lite] [ -x ] dump
+ shorewall[-lite] dump
Produce a verbose report about the firewall.
@@ -919,7 +919,7 @@
refresh (Not supported by Shorewall Lite)
- shorewall [ -q ] refresh
+ shorewall refresh
The rules involving the broadcast addresses of firewall
interfaces, the black list and ECN control rules are recreated to
@@ -996,7 +996,7 @@
restart
- shorewall[-lite] [ -q ] restart
+ shorewall[-lite] restart
<configuration-directory>
Restart is similar to shorewall stop
@@ -1010,7 +1010,7 @@
restore
- shorewall[-lite] [ -q ] restore [ <filename>
+ shorewall[-lite] restore [ <filename>
]
Restore Shorewall to a state saved using the
@@ -1030,7 +1030,7 @@
safe-restart (Not supported by Shorewall Lite)
- shorewall [ -q ] safe-restart [ <filename>
+ shorewall safe-restart [ <filename>
]
Only allowed if Shorewall is running. The current
@@ -1049,7 +1049,7 @@
safe-start (Not supported by Shorewall Lite)
- shorewall [ -q ] safe-start [ <filename>
+ shorewall safe-start [ <filename>
]
Shorewall is started normally. You will then be prompted
@@ -1082,27 +1082,25 @@
show
- shorewall [ -x ] show actions (Not supported by
- Shorewall Lite) — produces a list of actions available on
- the system.
+ shorewall show actions (Not supported by Shorewall
+ Lite) — produces a list of actions available on the
+ system.
- shorewall[-lite] [ -x ] show [ <chain> [
- <chain> ...]
- |classifiers|connections|log|nat|tc|tos]
+ shorewall[-lite] show [ <chain> [ <chain>
+ ...] |classifiers|connections|log|nat|tc|tos]
- shorewall[-lite] [ -x ] show <chain> [
- <chain> ... ] - produce a verbose report about the
- Netfilter chain(s). (iptables -L chain -n
+ shorewall[-lite] show <chain> [ <chain>
+ ... ] - produce a verbose report about the Netfilter
+ chain(s). (iptables -L chain -n -v)
+
+ shorewall[-lite] show mangle - produce a
+ verbose report about the mangle table. (iptables -t mangle
+ -L -n -v)
+
+ shorewall[-lite] show nat - produce a
+ verbose report about the nat table. (iptables -t nat -L -n
-v)
- shorewall[-lite] [ -x ] show mangle -
- produce a verbose report about the mangle table. (iptables
- -t mangle -L -n -v)
-
- shorewall[-lite] [ -x ] show nat - produce
- a verbose report about the nat table. (iptables -t nat -L
- -n -v)
-
shorewall[-lite] show [- m ] log - display
the last 20 packet log entries. The '-m' option is available in
Shorewall version 3.2.0 Beta5 and later and causes the MAC address
@@ -1139,7 +1137,7 @@
start
- shorewall[-lite] [ -q ] [ -f ] start [
+ shorewall[-lite] [ -f ] start [
<configuration-directory> ]
Start shorewall. Existing connections through shorewall